-
Notifications
You must be signed in to change notification settings - Fork 385
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IBC launch risk mitigation strategies #421
Comments
Another, related, question: do we want to implement a mechanism for client recovery? In particular, it seems to me like we could add something like a param-change proposal to allow Hub governance
This doesn't seem too risky to me, since:
Thoughts? Is this sufficient for avoiding accidentally frozen funds or unusable clients? One restriction is that the governance period must not be longer than the trusting period. |
(it could be an option when a client is created to allow governance to override or not) |
Note, we should also consider the client's trust level and the governance quorum. Ideally, we want quorum ≥ trust-level.
It could be the case that when the proposal passes, the submitted header would already be expired (eg. when trust period < 2 weeks) |
@dtribble notes that the governance vote can be simple (a height) to just deal with timeouts only. |
Note that unexpected upgrades which require other chains to change their light clients are irregular state changes anyways, so they might as well switch verification algorithms for different light clients as a part of it. |
In order to reduce the risk of certain light client attacks we might also want to increase the trust-threshold initially beyond +1/3, maybe to +1/2 (+2/3 might be too high). Higher levels require a greater set of past validator sets to collude, but also have the potential to increase ClientUpdate costs by requiring more intermediate bisection headers. That said in practice, since the validator set changes minimally, this might not matter. I wonder if anyone has stats on validator set turnover |
Split into #445, cosmos/cosmos-sdk#6488, cosmos/cosmos-sdk#6591. |
Notable risks:
Possible mitigation strategies:
Edits & comments welcome.
The text was updated successfully, but these errors were encountered: